Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15/01/2025, 22:34
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_63a89e5ff68c266a8748347edf4dc531.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_63a89e5ff68c266a8748347edf4dc531.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_63a89e5ff68c266a8748347edf4dc531.exe
-
Size
315KB
-
MD5
63a89e5ff68c266a8748347edf4dc531
-
SHA1
aa0a6c1802871bb169a8c98437f7ba89e7e91265
-
SHA256
191e4ed85957a0ee18d992a9c5c262708ff16e033d71a869cd15c1f4d4d506f5
-
SHA512
7f34875baa0096050b553d3dec41ce90df3cac36853340c458d355ed3cc957a361b473b0cd340a485dfccfa59eac7992640a363db03b6d11f303a7420fd42561
-
SSDEEP
6144:0gc//////tjEVTRXTuRLMJSZ25f+7z/IXioaf4v9WZ8bq/Wc+QUh4/ph:Tc//////eVlXTwMJb+7rIXioFW2nc+KP
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 4 IoCs
resource yara_rule behavioral1/memory/2872-11-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/2872-17-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/2872-15-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/2872-9-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2896 set thread context of 2872 2896 JaffaCakes118_63a89e5ff68c266a8748347edf4dc531.exe 30 PID 2872 set thread context of 2196 2872 JaffaCakes118_63a89e5ff68c266a8748347edf4dc531.exe 31 -
resource yara_rule behavioral1/memory/2872-6-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/2872-7-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/2872-4-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/2872-8-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/2872-11-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/2872-17-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/2872-15-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/2872-9-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/2872-10-0x0000000000400000-0x00000000004C3000-memory.dmp upx -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\2010.txt JaffaCakes118_63a89e5ff68c266a8748347edf4dc531.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_63a89e5ff68c266a8748347edf4dc531.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_63a89e5ff68c266a8748347edf4dc531.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "443142318" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D6DEDD81-D390-11EF-848B-7694D31B45CA} = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2196 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2196 IEXPLORE.EXE 2196 IEXPLORE.EXE 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2896 wrote to memory of 2872 2896 JaffaCakes118_63a89e5ff68c266a8748347edf4dc531.exe 30 PID 2896 wrote to memory of 2872 2896 JaffaCakes118_63a89e5ff68c266a8748347edf4dc531.exe 30 PID 2896 wrote to memory of 2872 2896 JaffaCakes118_63a89e5ff68c266a8748347edf4dc531.exe 30 PID 2896 wrote to memory of 2872 2896 JaffaCakes118_63a89e5ff68c266a8748347edf4dc531.exe 30 PID 2896 wrote to memory of 2872 2896 JaffaCakes118_63a89e5ff68c266a8748347edf4dc531.exe 30 PID 2896 wrote to memory of 2872 2896 JaffaCakes118_63a89e5ff68c266a8748347edf4dc531.exe 30 PID 2872 wrote to memory of 2196 2872 JaffaCakes118_63a89e5ff68c266a8748347edf4dc531.exe 31 PID 2872 wrote to memory of 2196 2872 JaffaCakes118_63a89e5ff68c266a8748347edf4dc531.exe 31 PID 2872 wrote to memory of 2196 2872 JaffaCakes118_63a89e5ff68c266a8748347edf4dc531.exe 31 PID 2872 wrote to memory of 2196 2872 JaffaCakes118_63a89e5ff68c266a8748347edf4dc531.exe 31 PID 2872 wrote to memory of 2196 2872 JaffaCakes118_63a89e5ff68c266a8748347edf4dc531.exe 31 PID 2196 wrote to memory of 2688 2196 IEXPLORE.EXE 32 PID 2196 wrote to memory of 2688 2196 IEXPLORE.EXE 32 PID 2196 wrote to memory of 2688 2196 IEXPLORE.EXE 32 PID 2196 wrote to memory of 2688 2196 IEXPLORE.EXE 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_63a89e5ff68c266a8748347edf4dc531.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_63a89e5ff68c266a8748347edf4dc531.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_63a89e5ff68c266a8748347edf4dc531.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_63a89e5ff68c266a8748347edf4dc531.exe2⤵
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2196 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2688
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54684aea692cc47a9e2acb6d946feed02
SHA1f9072f5646b3451f5b32a25f5109baba965c3bff
SHA2563fcb2cff5544707d2a6d95e9e2e7910a7d6b7b3cc400a68913696fafd6fc4aba
SHA512261666c67ec0c9aabeab9a575b73f1f13e4298a5b83b7dac44a3621ee30337cbcdee78e8984deab773a856f39fb44595e99f45c6487aa519c3f44cde7b895969
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9b00e21a4e2886d47c945bdb396d2fc
SHA134a9d32ac0ef99ba28160d07e00872800bebb380
SHA256ee45ecf6ded1dd981f92e5642462c9f066f61fa0b85fa2966d9d825a21941bdf
SHA512648b2a1e7c32bb78021f7f2ea4c23b8099c1dabdba0b574b4f1a428bf43e496b117555a35ccd309778092e91d7c6ea458dbe9ca9184691873e9b9584bd5c3d8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1d5ef5a80f8022e23f01cc015b78dc8
SHA18a9bbb7a8ec188fd2c33502ca891cdbba6eed4b6
SHA2564669535fffd06d883b44719138e65834be49f92d04d3815a2b3b3265af8564a3
SHA512f3169541022eb4ce6f62754b703aea20a8b56af565511b7ac372b4193699d2458071dfaf54797b98aec0d834a5a228d4f67ea8e7af3e070215815b900d64db3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8e520d342c6f8795a0d39442684b750
SHA1102bfe12974ead87a23236ea9b71316a784f3a64
SHA25666d7220175a6a235a56a1650e512a6b94b61ab3a378b35b8353357b2166ed077
SHA512baf715616b0a4ecf312f10499d513837a5a76c65bab00cd5b33be168dceacc9f7c45e9f52f8683326608d4d88ef8c1277ae111816f79c8c4fe43303a5c7284d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578ba2cf27ffcff78155266613c985dcd
SHA1b3cd1b240778f14c3fe1ab069fdbb1c68ba45d75
SHA256329d614e02fef76116f4ceeb830089d559074227a6d8d64a1c85490319c72ae4
SHA512a005d6a4407c77f996d92d5200df6efaea55a085a12a0c13d388b59e46aa45777fcb1c82de3e5e49b44ddde15f367e521f867eb407c81f482e0808c43b63a7d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50809dc0957d892aba8a8d8311aa718db
SHA12b4e0b6364d10a06f477c0b1efd0029cd111a956
SHA256f8bdb55ba107c68a3697188f71124186f6f4d7b6967e9b89869ba3b164ab8260
SHA5121686edc5c4b171daa0e713051fad60134dea0cd3701842dc8bf1ef74c03fccb3d185ed6af73ce07e79e72be40052d4a0f241a8d39580a52e3ce932b18b731444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c1bc45a8a0503ba5ef6374e98c8e49f
SHA1ff9758377072a31eaff91cc4998aed09e5729c9f
SHA2564a0d9831c10e50b1d08b9b8dda37eda9613af379e5e925abe2a84cf8b9815fe2
SHA512dbd8c48ee5142d756f69e6c6b226dda91e9c6ec1ee30606a7c31df6def1eb96cefa44ea65d0ae912a1be858b7a2994b82966baff8204d22771dd56f10a482685
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f92f87c6fe1d6ec2e8cf65e8119bb2b5
SHA1696cf4e90f64f4f55ed35cf45d5decd957a1ad33
SHA256171fbfb388d89f4c18c6f6d40e87d13428f389dbf4e3d9fb5bb8c88f93d68a17
SHA5124273f21a7f3aed85246341ea786e827dd236685ff5e16c07ab6bf88b334a1c6b7802df96d05981dc57d9e34239ac86f0f1bcda30155614fd964711ce080eff51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5838d2a255eeb6bdc6f127150c3ab2f46
SHA1d2809e809c881fbe7a3cf26a2ed2c870d9991701
SHA25663d3ee7ac55a45f20fa22d8908f50922a085ee773bfec7ba767337018d65c89f
SHA512d300c5adfe0d2bc8d8a5f783d47a8afa0051e0c4ef24c08d93d118f02f50f316927c69e875ba884b0e8e067f169821a7f628fae41eb02a6bc5f454a9b9cdcb87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a78ced4c3bd550806e0e43a83dc3357
SHA1339c993a6c48e31f9a7f5fd694b8f5172b29428b
SHA256ff99c7fa87b998ab75423c59fcdee1fbf7bdc214368c93fe323f40efa813baf0
SHA512f5ff9c7fc298f4e311968f385d5e5910de95ef40609ebc8f3a189fe186a3ddfecf924ab22bbbb6cb147585f6577ece79550e66e8662340da2b47d2dbe634e566
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e19ba16cbf3db3e25828ae8fd42936e7
SHA175c92fce4ee05e9d541abdcd4ec9331812188af2
SHA25612c2d6961be07fc104095ae0238b35490f4e26eb5ae5779fede60abeb64e17c9
SHA512f6801ee6d4c796d27de6e1fddba6951607611975ae59a5d89acf525cb766602b44d53394936b343d57f59db93b7b3bf9f2706055083b7b80d4087d18bd67f702
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0b6ed1a13ecdd16676f8bde234da849
SHA18422326e185cacc5c99813228ed26399dc982477
SHA25656d3853dd3e4f48feb60462c77a4b7584573add51618a3b980dee3dfaaf74f7f
SHA5121639dc8c33a0d57ddad5c33fb87f8cbf1af4a77d50f5b0348391304477d8b8aec8493b51bbd89e1063cc3b43632c5e5cd7866d7779419030fe61216e3371637a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5943303b13a1a6d7c71f854c08cb17b82
SHA19df13cd5819d0ed9d68386e3755aa99fa0384cc1
SHA256e39d4b64bc19fb883c9fd15e039c04b6fd6f988333438c303b9966fdb6af1a11
SHA512cc0df289a30f175b448a2dd28717d3b0dc09539f21addf92053cfc136cd3ef4082e5a0f5b12c180c2d92ea784515ada5671036f5b99a3a7e2f739135623c6f9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55dfd25738bc00a213afe589204370c79
SHA1e843b779ed4bd5b61b49916475ceed13b18e11c9
SHA2565b8b9d203a26fdaa9d492faf899ed11498e807e94c9fad202fcd48e53b216629
SHA5123250ff21d3844ce52a3f58232550e7b901186a286478dacd7ebb9cb23525361b15e9719c8e9d72bd8d07feb4b3654295177a36d3ea1467f8ae9ea9c3329317c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3bb52d928aed1f29d24f46161262b14
SHA1da2f90b649b6a6722ba5d895ba61ac04777673ff
SHA256717cc7c938597f14d96756a8237325b06051fabea3a8298fab0a5575e1d98966
SHA51283758444ca03455ae10ed8f5dda4a67fdd5c6f92a9ab6b513da69672c53c18ad1e07688133bfe52e46c834a67982d5fafef589a130b6ae51ae3fb8c49ac4e086
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc044a6ac27283f9468f5a0d1948d00d
SHA1897162ef51b6090e0ee5c33887723f25566a7845
SHA2568fabc8a6f1a59b320bf05abdc2bf179d0d6021788ed1bafee106e6ebeefaf3db
SHA512235df188df2114d527a0f15c53e2caaaae1dbb9d189f4ed318339b796e0bd7085312611eb888c2ff09351a51263a9b936ace42803a86306f165e95bcd1a577fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557d8e3adab4d7ce471825bfed855ff6e
SHA16b2fed496372dc9d8c30b5aa16ce6d9ac80ec110
SHA2560258ba6747ce8f80beeb1a0267d63fa4f377c09ae13f5a548ec62e7438436033
SHA5128a1648a8aadd347da01ab130b976f10416dede7fd0d768cf43ac01bcf18060ae7a55f808ae10b44f1c2803e2ee06aa660500a1b432ca3f82fb08ecdc8248f0e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599ec968174f15d1019c5094dbc4fe881
SHA1c2d3559d4554a9e6929630d0c6bb10f39b73340f
SHA25679d8ca30e451bc8e8df26c8bed6d916faeed42df7489cfba652958a66c7e290a
SHA51245724e8c7142daee57443f9eb6781d2aa4b31c809f259db6d219c4db1d25d503a33e428a30dea1b064fa85215af769b77cb5ef3de3bba9af46d17eb2f2e60511
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b